Pub Date : 2016-10-01DOI: 10.1109/CCST.2016.7815685
Jimmy Anderson Florez Zuluaga, R. C. Logreira, Mario Muñoz, J. Vargas-Bonilla
The use of online messaging systems to exchange information has changed due to the ability to share text, video and pictures almost immediately. Also it has become an excellent alternative for transmitting data with certain reserve levels in places or where voice signals and other forms of communication are not of high quality and/or availability, creating gaps in critical information security systems. This article describes the inherent risk of use messaging apphcations for transmission of classified information, based on user needs, but with a concept of organizational use. The analyzed elements are usability, privacy of contacts and content, data security, safe storage of information, traceability of messages, lifespan of the message, information storage encryption protocols and channel codification. Because of this, in this project, a survey has been conducted in regards to acceptable requirements applicable to these technologies in the work sector. This has led to the design of a set of applications from a usability standpoint while ensuring adequate and flexible security levels. Work completed in this research included aspects of design and architecture of a XMPP messaging system, privacy of information, use of local databases and storage of information according to relevant corporate security policies and agreements, biometric recognition systems for authentication encryption protocols.
{"title":"Architecture of instant messaging systems for secure data transmision","authors":"Jimmy Anderson Florez Zuluaga, R. C. Logreira, Mario Muñoz, J. Vargas-Bonilla","doi":"10.1109/CCST.2016.7815685","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815685","url":null,"abstract":"The use of online messaging systems to exchange information has changed due to the ability to share text, video and pictures almost immediately. Also it has become an excellent alternative for transmitting data with certain reserve levels in places or where voice signals and other forms of communication are not of high quality and/or availability, creating gaps in critical information security systems. This article describes the inherent risk of use messaging apphcations for transmission of classified information, based on user needs, but with a concept of organizational use. The analyzed elements are usability, privacy of contacts and content, data security, safe storage of information, traceability of messages, lifespan of the message, information storage encryption protocols and channel codification. Because of this, in this project, a survey has been conducted in regards to acceptable requirements applicable to these technologies in the work sector. This has led to the design of a set of applications from a usability standpoint while ensuring adequate and flexible security levels. Work completed in this research included aspects of design and architecture of a XMPP messaging system, privacy of information, use of local databases and storage of information according to relevant corporate security policies and agreements, biometric recognition systems for authentication encryption protocols.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"134 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80464194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CCST.2016.7815722
B. V. Leeuwen, W. Stout, V. Urias
Moving Target Defense (MTD) has received significant focus in technical publications. The publications describe MTD approaches that periodically change some attribute of the computer network system. The attribute that is changed, in most cases, is one that an adversary attempts to gain knowledge of through reconnaissance and may use its knowledge of the attribute to exploit the system. The fundamental mechanism an MTD uses to secure the system is to change the system attributes such that the adversary never gains the knowledge and cannot execute an exploit prior to the attribute changing value. Thus, the MTD keeps the adversary from gaining the knowledge of attributes necessary to exploit the system. Most papers conduct theoretical analysis or basic simulations to assess the effectiveness of the MTD approach. More effective assessment of MTD approaches should include behavioral characteristics for both the defensive actor and the adversary; however, limited research exists on running actual attacks against an implemented system with the objective of determining the security benefits and total cost of deploying the MTD approach. This paper explores empirical assessment through experimentation of MTD approaches. The cyber-kill chain is used to characterize the actions of the adversary and identify what classes of attacks were successfully thwarted by the MTD approach and what classes of attacks could not be thwarted In this research paper, we identify the experiment environments and where experiment fidelity should be focused to evaluate the effectiveness of MTD approaches. Additionally, experimentation environments that support contemporary technologies used in MTD approaches, such as software defined networking (SDN), are also identified and discussed.
{"title":"MTD assessment framework with cyber attack modeling","authors":"B. V. Leeuwen, W. Stout, V. Urias","doi":"10.1109/CCST.2016.7815722","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815722","url":null,"abstract":"Moving Target Defense (MTD) has received significant focus in technical publications. The publications describe MTD approaches that periodically change some attribute of the computer network system. The attribute that is changed, in most cases, is one that an adversary attempts to gain knowledge of through reconnaissance and may use its knowledge of the attribute to exploit the system. The fundamental mechanism an MTD uses to secure the system is to change the system attributes such that the adversary never gains the knowledge and cannot execute an exploit prior to the attribute changing value. Thus, the MTD keeps the adversary from gaining the knowledge of attributes necessary to exploit the system. Most papers conduct theoretical analysis or basic simulations to assess the effectiveness of the MTD approach. More effective assessment of MTD approaches should include behavioral characteristics for both the defensive actor and the adversary; however, limited research exists on running actual attacks against an implemented system with the objective of determining the security benefits and total cost of deploying the MTD approach. This paper explores empirical assessment through experimentation of MTD approaches. The cyber-kill chain is used to characterize the actions of the adversary and identify what classes of attacks were successfully thwarted by the MTD approach and what classes of attacks could not be thwarted In this research paper, we identify the experiment environments and where experiment fidelity should be focused to evaluate the effectiveness of MTD approaches. Additionally, experimentation environments that support contemporary technologies used in MTD approaches, such as software defined networking (SDN), are also identified and discussed.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"55 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89819756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CCST.2016.7815682
A. Gagnon
This paper presents the fields results in non-obtrusive life sign monitoring performed using a low emission, compact high frequency Doppler radar, which can detect body movements associated with breathing and the heart beating. Such a system is particularly useful where attaching sensors to the body is undesirable; for example, monitoring detainees in a prison who are at risk of suicide, self-harm, and medical complications due to drugs or alcohol. This method of monitoring can aid greatly in situations where it can be difficult to ascertain a person's status, such as a person who is sleeping under a blanket. While a breathing and cardiac signal is visible in the Doppler radar signal, it can be corrupted by noise and interference by so-called nuisance signals (e.g., movements associated with fans, water flowing from faucets and toilets, door micro-motion, light fixture ballast vibration and other body movements). This work is part of a three-year project that involves four organizations; CSC (end-user), KG Spectrum (radar-based perimeter intrusion detection systems), Carleton-University (bio-medical) and Ottawa-University (signal processing). The final goal is to develop a robust system for detection of attempted suicide events in prisons in time to allow for lifesaving interventions. This has been done in a novel way by installing one high range (75cm) spacial resolution, scanning antenna and high frequency (24.125GHz) radars in prison cells and by processing signals extracted from the radars in real-time. This unique radar architecture allows the usage of novel signal processing and pattern recognition algorithms to locate the subject and removing interference and reliably estimate breathing and heartbeat signals, even when the subject is non-stationary and then to produce an alarm when these signals cannot be observed or significant changes, in breathing pattern or heart rate pattern, representing abnormal behavior have been detected within the observation cell. This research project is performing time, frequency and pattern domain analysis on the radar data and explores signal processing approaches for the robust and accurate detection and estimation of the respiratory with heartbeat rate. Outcome of this research will be useful in mitigating the risks associated with detainees by providing a life sign monitoring approach that can help enable timely responses. Such a system can also find application in smart health homes for monitoring people at risk, such as the elderly or infants, as well as in psychological institution. In addition to presenting the results of filed trial, this paper covers the innovative engineering aspects of using high frequency, high range resolution and high sampling rate as a mean to geo-localize the source of movement within the prison cells, thereby increasing the efficiency of the signal processing eliminating the need to process on overall volume wise integrated Doppler signal. The use of geo-localization provide
{"title":"Field trial results using a novel integration of unique millimeterwave Doppler radar for high performance non-obtrusive life sign (breathing and heart beating) monitoring of high suicide risk prisonner in observation cell","authors":"A. Gagnon","doi":"10.1109/CCST.2016.7815682","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815682","url":null,"abstract":"This paper presents the fields results in non-obtrusive life sign monitoring performed using a low emission, compact high frequency Doppler radar, which can detect body movements associated with breathing and the heart beating. Such a system is particularly useful where attaching sensors to the body is undesirable; for example, monitoring detainees in a prison who are at risk of suicide, self-harm, and medical complications due to drugs or alcohol. This method of monitoring can aid greatly in situations where it can be difficult to ascertain a person's status, such as a person who is sleeping under a blanket. While a breathing and cardiac signal is visible in the Doppler radar signal, it can be corrupted by noise and interference by so-called nuisance signals (e.g., movements associated with fans, water flowing from faucets and toilets, door micro-motion, light fixture ballast vibration and other body movements). This work is part of a three-year project that involves four organizations; CSC (end-user), KG Spectrum (radar-based perimeter intrusion detection systems), Carleton-University (bio-medical) and Ottawa-University (signal processing). The final goal is to develop a robust system for detection of attempted suicide events in prisons in time to allow for lifesaving interventions. This has been done in a novel way by installing one high range (75cm) spacial resolution, scanning antenna and high frequency (24.125GHz) radars in prison cells and by processing signals extracted from the radars in real-time. This unique radar architecture allows the usage of novel signal processing and pattern recognition algorithms to locate the subject and removing interference and reliably estimate breathing and heartbeat signals, even when the subject is non-stationary and then to produce an alarm when these signals cannot be observed or significant changes, in breathing pattern or heart rate pattern, representing abnormal behavior have been detected within the observation cell. This research project is performing time, frequency and pattern domain analysis on the radar data and explores signal processing approaches for the robust and accurate detection and estimation of the respiratory with heartbeat rate. Outcome of this research will be useful in mitigating the risks associated with detainees by providing a life sign monitoring approach that can help enable timely responses. Such a system can also find application in smart health homes for monitoring people at risk, such as the elderly or infants, as well as in psychological institution. In addition to presenting the results of filed trial, this paper covers the innovative engineering aspects of using high frequency, high range resolution and high sampling rate as a mean to geo-localize the source of movement within the prison cells, thereby increasing the efficiency of the signal processing eliminating the need to process on overall volume wise integrated Doppler signal. The use of geo-localization provide","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"25 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75230766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CCST.2016.7815691
Dwight Home, S. Nair
In this paper we present the Prom Problem (TPP) which exemplifies a special class of matchmaking challenges. We introduce the notion of identity linked wishes - wishes that involve specific identities and are valid if and only if all involved parties have that wish. A number of protocols over the years have highlighted the conflicting goals of anonymity and authentication in attempting to match users with common wishes. More recent works have built upon past attempts proposing solutions for private and privacy-enhanced matchmaking with additional security goals. Yet those protocols are insufficient in the context of TPP due primarily to the lack of fairness and inability to ensure security and privacy. We describe TPP in detail, compare with prior work, and propose a fair and privacy-enhanced matchmaking protocol supporting identity linked wishes with an untrusted matchmaker. In practical terms, our technology can prevent much of the potential damage from data breaches similar to the recent Ashley Madison hack which has allegedly resulted in blackmail, ruined careers, espionage, and even suicide. We give a pseudo-code example of our solution along with its security and preliminary performance evaluation.
{"title":"The Prom Problem: Fair and privacy-enhanced matchmaking with identity linked wishes","authors":"Dwight Home, S. Nair","doi":"10.1109/CCST.2016.7815691","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815691","url":null,"abstract":"In this paper we present the Prom Problem (TPP) which exemplifies a special class of matchmaking challenges. We introduce the notion of identity linked wishes - wishes that involve specific identities and are valid if and only if all involved parties have that wish. A number of protocols over the years have highlighted the conflicting goals of anonymity and authentication in attempting to match users with common wishes. More recent works have built upon past attempts proposing solutions for private and privacy-enhanced matchmaking with additional security goals. Yet those protocols are insufficient in the context of TPP due primarily to the lack of fairness and inability to ensure security and privacy. We describe TPP in detail, compare with prior work, and propose a fair and privacy-enhanced matchmaking protocol supporting identity linked wishes with an untrusted matchmaker. In practical terms, our technology can prevent much of the potential damage from data breaches similar to the recent Ashley Madison hack which has allegedly resulted in blackmail, ruined careers, espionage, and even suicide. We give a pseudo-code example of our solution along with its security and preliminary performance evaluation.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"11 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90427316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CCST.2016.7815687
M. Vassiliou, D. Alberts, S. Shah
Success in complex missions, whether in the civilian, military, or mixed sectors, depends on agile organizations adapting their enterprise approaches to suit the purposes and circumstances at hand, and being able and willing to communicate necessary information. Case studies of complex endeavors in theaters including warfare, terrorism, and response to natural disasters have shown that communication failures are a very significant cause of adverse consequences, often including overall mission failure. Communication failures can be behavioral ones, exacerbated by inappropriate organizational choices. They can also arise from shortfalls in system design and technology. Enterprise approaches that are decentralized and network-enabled to varying degrees have differing propensities to communicate necessary information in diverse circumstances. They also have a complex and varying interplay with the enterprise's information and communications technology, and varying resilience to communications disruption. While more agile organizations can make up for communications shortfalls to an extent, there is no substituted for assured communications capabilities. In this connection, the ability to communicate relatively small amounts of information reliably can be much more important than the ability to transmit large multimedia files with high throughput. Important facets of assured communications systems include agility with respect to channel and spectrum, protection from attack and tampering, resilience in the face of disruptions, and interoperability. In some cases the goals can be achieved with appropriate policy, and in others with new technology development.
{"title":"Mission success: Assured communications and agile organizations","authors":"M. Vassiliou, D. Alberts, S. Shah","doi":"10.1109/CCST.2016.7815687","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815687","url":null,"abstract":"Success in complex missions, whether in the civilian, military, or mixed sectors, depends on agile organizations adapting their enterprise approaches to suit the purposes and circumstances at hand, and being able and willing to communicate necessary information. Case studies of complex endeavors in theaters including warfare, terrorism, and response to natural disasters have shown that communication failures are a very significant cause of adverse consequences, often including overall mission failure. Communication failures can be behavioral ones, exacerbated by inappropriate organizational choices. They can also arise from shortfalls in system design and technology. Enterprise approaches that are decentralized and network-enabled to varying degrees have differing propensities to communicate necessary information in diverse circumstances. They also have a complex and varying interplay with the enterprise's information and communications technology, and varying resilience to communications disruption. While more agile organizations can make up for communications shortfalls to an extent, there is no substituted for assured communications capabilities. In this connection, the ability to communicate relatively small amounts of information reliably can be much more important than the ability to transmit large multimedia files with high throughput. Important facets of assured communications systems include agility with respect to channel and spectrum, protection from attack and tampering, resilience in the face of disruptions, and interoperability. In some cases the goals can be achieved with appropriate policy, and in others with new technology development.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"65 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88681129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CCST.2016.7815704
R. C. Logreira, Z. J. Florez, Mario Muñoz
The explosion in mobile communication use in our lives has led to a new method for information exchange between people. Therefore, there are now plenty of instant messaging applications, which have a single purpose that is done through different methods. Thus, methods and information exchange protocols play an important role in reducing processing times, low battery consumption and low bandwidth consumption. This article shows the comparison in time performance of an instant messager server through two open source cryptographic library implementations, using two asymmetric cryptographic processes in a centralized messaging system in order to seek confidentiality, integrity and authenticity of the messages. Cryptographic schemes used are Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA). In addition, it determines which library is more efficient to implement in that server.
{"title":"Cryptographic library performance comparison for instant messaging system centralized data","authors":"R. C. Logreira, Z. J. Florez, Mario Muñoz","doi":"10.1109/CCST.2016.7815704","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815704","url":null,"abstract":"The explosion in mobile communication use in our lives has led to a new method for information exchange between people. Therefore, there are now plenty of instant messaging applications, which have a single purpose that is done through different methods. Thus, methods and information exchange protocols play an important role in reducing processing times, low battery consumption and low bandwidth consumption. This article shows the comparison in time performance of an instant messager server through two open source cryptographic library implementations, using two asymmetric cryptographic processes in a centralized messaging system in order to seek confidentiality, integrity and authenticity of the messages. Cryptographic schemes used are Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA). In addition, it determines which library is more efficient to implement in that server.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"144 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85386271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CCST.2016.7815679
Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo
An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.
{"title":"A comparative analysis on the performance of static handwritten verification systems on realistic scenarios","authors":"Rodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramón Blanco-Gonzalo, R. Sánchez-Reillo","doi":"10.1109/CCST.2016.7815679","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815679","url":null,"abstract":"An analysis on realistic conditions for static handwritten signature verification systems is presented. Evaluation conditions are studied so to approximate as accurately as possible the conditions of a real-world operational scenario. Also, the problem of modeling realistic attacks by using databases containing forgeries is considered in the analysis. To do so, a database collected with different levels of knowledge and training is used. Performance evaluation results with these restrictions are given over several databases. Results show the effect of the amount of training and the information available to the forger on the attack resistance of some algorithms.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"61 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84677197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CCST.2016.7815675
W. Stout, V. Urias
Great advances in technology have paved the way for the computerization and interconnectedness of the world around us. The Internet of Things (IoT) describes a network comprised of physical objects or “things” embedded with electronics, software, sensors and connectivity to achieve greater value and service by exchanging data with manufacturers, users, and/or other connected devices. However, it is often the case that some of these devices are constrained by limited processing power, memory, and power consumption. These limitations may enable adverse effects as the IoT becomes pervasive, reaching into infrastructure, vehicles, and homes. As history has shown, the architects of the Internet were focused primarily on the efficiency and scaling aspects of data transfer protocols; at the dawn of the Internet, network and computer security were vacant research areas. The current trend shows the IoT market growing at an accelerated rate - will security again become an afterthought? The goal of this paper is to provide to not only a better understanding of the various IoT domains, but to survey the shortcomings and challenges to securing IoT devices and their interactions with cloud and enterprise applications.
{"title":"Challenges to securing the Internet of Things","authors":"W. Stout, V. Urias","doi":"10.1109/CCST.2016.7815675","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815675","url":null,"abstract":"Great advances in technology have paved the way for the computerization and interconnectedness of the world around us. The Internet of Things (IoT) describes a network comprised of physical objects or “things” embedded with electronics, software, sensors and connectivity to achieve greater value and service by exchanging data with manufacturers, users, and/or other connected devices. However, it is often the case that some of these devices are constrained by limited processing power, memory, and power consumption. These limitations may enable adverse effects as the IoT becomes pervasive, reaching into infrastructure, vehicles, and homes. As history has shown, the architects of the Internet were focused primarily on the efficiency and scaling aspects of data transfer protocols; at the dawn of the Internet, network and computer security were vacant research areas. The current trend shows the IoT market growing at an accelerated rate - will security again become an afterthought? The goal of this paper is to provide to not only a better understanding of the various IoT domains, but to survey the shortcomings and challenges to securing IoT devices and their interactions with cloud and enterprise applications.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"79 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75155393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CCST.2016.7815713
Jason McNeely, M. Hatfield, Abir Hasan, Nusrat Jahan
Detection of potential hijackings of Unmanned Aerial Vehicles (UAVs) is an important capability to have for the safety of the future airspace and prevention of loss of life and property. In this paper, we propose using basic statistical measures as a fingerprint to flight patterns that can be checked against previous flights. We generated baseline flights and then simulated hijacking scenarios to determine the extent of the feasibility of this method. Our results indicated that all of the direct hijacking scenarios were detected, but flights with control instability caused by malicious acts were not detected.
{"title":"Detection of UAV hijacking and malfunctions via variations in flight data statistics","authors":"Jason McNeely, M. Hatfield, Abir Hasan, Nusrat Jahan","doi":"10.1109/CCST.2016.7815713","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815713","url":null,"abstract":"Detection of potential hijackings of Unmanned Aerial Vehicles (UAVs) is an important capability to have for the safety of the future airspace and prevention of loss of life and property. In this paper, we propose using basic statistical measures as a fingerprint to flight patterns that can be checked against previous flights. We generated baseline flights and then simulated hijacking scenarios to determine the extent of the feasibility of this method. Our results indicated that all of the direct hijacking scenarios were detected, but flights with control instability caused by malicious acts were not detected.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"38 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76401034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CCST.2016.7815714
Wicher Visser, A. Schwaninger, D. Hardmeier, A. Flisch, M. Costin, C. Vienne, F. Sukowski, U. Hassler, I. Dorion, Abraham Marciano, G. Koomen, M. Slegt, Andrea Canonica
Customs administrations are responsible for the enforcement of fiscal integrity and security of movements of goods across land and sea borders. In order to verify whether the transported goods match the transport declaration, X-ray imaging of containers is used at many customs site worldwide. The main objective of the research and development project “Automated Comparison of X-ray Images for Cargo Scanning (ACXIS)”, which is funded by the European 7th Framework Program, is to improve the efficiency and effectiveness of the inspection procedures of cargo at customs using X-ray technology. The current inspection procedures are reviewed to identify risks, catalogue illegal cargo, and prioritize detection scenarios. Based on these results, we propose an integrated solution that provides automation, information exchange between customs administrations, and computer-based training modules for customs officers. Automated target recognition (ATR) functions analyze the X-ray image after a scan is made to detect certain types of goods such as cigarettes, weapons and drugs in the freight or container. Other helpful information can also be provided, such as the load homogeneity, total or partial weight, or the number of similar items. The ATR functions are provided as an option to the user. The X-ray image is transformed into a manufacturer-independent format through geometrical and spectral corrections and stored into a database along with the user feedback and other related data. This information can be exchanged with similar systems at other sites, thus facilitating information exchange between customs administrations. The database is seeded with over 30'000 examples of legitimate and illegal goods. These examples are used by the ATR functions through machine learning techniques, which are further strengthened by the information exchange. In order to improve X-ray image interpretation competency of human operators (customs officers), a computer-based training software is developed that simulates these new inspection procedures. A study is carried out to validate the effectiveness and efficiency of the computer-based training as well as the implemented procedures. Officers from the Dutch and Swiss Customs administrations partake in the study, covering both land and sea borders.
{"title":"Automated comparison of X-ray images for cargo scanning","authors":"Wicher Visser, A. Schwaninger, D. Hardmeier, A. Flisch, M. Costin, C. Vienne, F. Sukowski, U. Hassler, I. Dorion, Abraham Marciano, G. Koomen, M. Slegt, Andrea Canonica","doi":"10.1109/CCST.2016.7815714","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815714","url":null,"abstract":"Customs administrations are responsible for the enforcement of fiscal integrity and security of movements of goods across land and sea borders. In order to verify whether the transported goods match the transport declaration, X-ray imaging of containers is used at many customs site worldwide. The main objective of the research and development project “Automated Comparison of X-ray Images for Cargo Scanning (ACXIS)”, which is funded by the European 7th Framework Program, is to improve the efficiency and effectiveness of the inspection procedures of cargo at customs using X-ray technology. The current inspection procedures are reviewed to identify risks, catalogue illegal cargo, and prioritize detection scenarios. Based on these results, we propose an integrated solution that provides automation, information exchange between customs administrations, and computer-based training modules for customs officers. Automated target recognition (ATR) functions analyze the X-ray image after a scan is made to detect certain types of goods such as cigarettes, weapons and drugs in the freight or container. Other helpful information can also be provided, such as the load homogeneity, total or partial weight, or the number of similar items. The ATR functions are provided as an option to the user. The X-ray image is transformed into a manufacturer-independent format through geometrical and spectral corrections and stored into a database along with the user feedback and other related data. This information can be exchanged with similar systems at other sites, thus facilitating information exchange between customs administrations. The database is seeded with over 30'000 examples of legitimate and illegal goods. These examples are used by the ATR functions through machine learning techniques, which are further strengthened by the information exchange. In order to improve X-ray image interpretation competency of human operators (customs officers), a computer-based training software is developed that simulates these new inspection procedures. A study is carried out to validate the effectiveness and efficiency of the computer-based training as well as the implemented procedures. Officers from the Dutch and Swiss Customs administrations partake in the study, covering both land and sea borders.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90191688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}